General

  • Target

    Open AI Sora Vesion 5.42.zip

  • Size

    77.8MB

  • Sample

    240724-mpxqcavdrf

  • MD5

    772dab1124533314eb796d7a7f0fe8f8

  • SHA1

    d686e643fb67e9811cbb13be9d369d202f4a3e5a

  • SHA256

    ef868cd1ae46702cd6ac9eb422d4c0b788e68127b7017c6c29ba928c54fc1d8e

  • SHA512

    65dde6003953065256cb8264bac98711e03f36f60c9430bdefa04872af4843c65de29273614317ed5c49ad132fa5283d7b52ce4ecbcbd6f83fd2bf6e345cdc0b

  • SSDEEP

    1572864:qLYpfkGv/a5y4jBsx/d8aUl9/GKPCo0/fR2HpRnLkSleMdmBisq8x1IxOh:qLQMIa5y4GrxUltkfRCLkSEBqAAOh

Malware Config

Targets

    • Target

      Open AI Sora Vesion 5.42.exe

    • Size

      157.9MB

    • MD5

      167af794837fe9de07ee83acdb74343e

    • SHA1

      a3f718d502a0f9e8382d12da9704433b96ea53ed

    • SHA256

      06c81d76f89cd374efcf4140b1f8239f30a89b1132608c3696e64199c9d9bd0c

    • SHA512

      8e78779a4d43604e705335c45569137ddc0b8b5448d15c44c1bb0fae59c95457dfa896bb3671aec79a0082f104ffa61182453218f759669320b9cba909c0d588

    • SSDEEP

      1572864:FHMlnmXXHfarJ2MH6rd07/eGpQvyLxCi70QzyhpPc2qfF4SagVnhqODQA86:NInmXXHfatH6dg/eiZzwJgFo

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks